IBM Process Server supports a service-oriented architecture (SOA) by providing a platform for using diverse technologies to integrate business applications. In this course, you learn how IBM Process Server enables business integration applications to define business logic and processes based on Web Services Business Process Execution Language (WS-BPEL), and business rules. In the intensive hands-on lab exercises, you design, develop, and test a comprehensive business integration solution. You use the IBM Integration Designer tool to create business integration solutions by using the Service Component Architecture (SCA) programming model, the Service Data Objects (SDO) data model, and the mediation flow programming model.
-
This course is also available as self-paced virtual (e-learning) course Supporting REST and JOSE in IBM DataPower Gateway V7.5 (ZE752G). This option does not require any travel.
This course teaches you the developer skills that are required to configure and implement services that support REST-based traffic and JOSE-based signatures and encryption on the IBM DataPower Gateways (IDG) with firmware version 7.5.1.
The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its JSON, XML, web services, and REST deployments. For JSON payloads, DataPower supports digital signatures and encryption that conform to the JSON Object Signing and Encryption (JOSE) specification.
Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to use the configuration options, processing actions, and GatewayScript to support REST-based message traffic. To protect JSON message payloads, you use JSON Web Signature (JWS) and JSON Web Encryption (JWE) actions in the processing policy of a service.
Hands-on exercises give you experience working directly with a DataPower gateway. The exercises focus on skills such as selecting request and response types, using the HTTP method criteria in a matching rule, style sheet and GatewayScript transforms, GatewayScript CLI debugging, signing JSON payloads, and encrypting JSON payloads.
-
This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
-
This B6158G: IBM Cognos Analytics: Author Reports Fundamentals v11.0.x offering provides Business and Professional Authors with an introduction to report building techniques using relational data models. Techniques to enhance, customize, and manage professional reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity.
-
This course teaches Information Server and/or DataStage administrators to configure, manage, and monitor the DataStage Engine which plays a crucial role in Information Server. It not only runs high performance parallel ETL jobs designed and built in DataStage. It also supports other Information Server products including Information Analyzer, QualityStage, and Data Click. After introducing DataStage parallel jobs and the Engine that runs them, the course describes DataStage project configuration, the Engine’s development and runtime environments, and the Engine’s data source connectivity. In addition the course explains how to import and export DataStage objects, how to run and monitor DataStage jobs through the command line and GUI, and how to use some important Engine utilities.
-
This course enables students to acquire the skills necessary to use the Information Governance Catalog to analyze metadata stored within the Information Server Repository. The emphasis is on how metadata gets captured within the repository and how to explore and analyze the metadata it contains.
-
This 0A108G: Introduction to IBM SPSS Modeler Text Analytics v18.1.1 course (formerly: Introduction to IBM SPSS Text Analytics for IBM SPSS Modeler (v18)) teaches you how to analyze text data using IBM SPSS Modeler Text Analytics. You will be introduced to the complete set of steps involved in working with text data, from reading the text data to creating the final categories for additional analysis. After the final model has been created, there is an example of how to apply the model to perform churn analysis in telecommunications.
Topics in this official IBM analytics course include how to automatically and manually create and modify categories, how to edit synonym, type, and exclude dictionaries, and how to perform Text Link Analysis and Cluster Analysis with text data. Also included are examples of how to create resource tempates and Text Analysis packages to share with other projects and other users.
-
This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM.
Learn how to analyze Resource Monitoring Facility (RMF) reports and implement service definitions using the WLM Interactive System Productivity Facility (ISPF) application. The course uses z/OS hands-on lab exercises to reinforce the concepts and techniques discussed in lecture.
Hands-on labs
This course includes hands-on lab exercises. Each student team, working on their own z/OS system, will configure RMF, analyze RMF reports to find bottlenecks, and utilize the WLM dialogs to create goals and classification rules in a service definition that manages a supplied z/OS workload
-
This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and Book Manager.
-
This CV964G: Db2 12 for z/OS SQL Performance and Tuning course is designed to teach the students how to prevent SQL performance problems and how to improve the performance of existing SQL.
-
This TP370G: IBM SmartCloud Control Desk 7.5 Configuration, Change and Release Management course introduces the functions in IBM SmartCloud Control Desk V7.5 that support the ITIL-based processes for Configuration, Change, and Release Management. In addition, the logical data model and hierarchies used to store and manage Configuration Items are discussed.
-
This CL487G: Db2 11.1 Quickstart for Experienced Relational DBAs course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements.
The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed.
We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA).
The lab demonstrations are performed using DB2 LUW 11.1 for Linux. For some lab tasks, students will have the option to complete the task using a DB2 command line processor, or using the graphical interface provided by IBM Data Server Manager.
-
This WM816G: CICS v5.3 Systems Tailoring and Administration course teaches CICS system programmers how to install, tailor, and administer CICS Transaction Server (TS) for z/OS. You learn to construct, run, and administer a CICS system. You tailor the system by configuring CICS to run applications, defining transactions, programs, files, web services, and other resources that CICS applications need. You administer CICS by using CICS transactions and the CICS Explorer.
The course also provides a thorough introduction to security and recovery concepts that are needed to administer new or existing installations of CICS TS. Topics include resource management, storage management, system control, task management, measurement and problem determination tools, intercommunication services, CICSPlex SM, Cloud, Liberty, DevOps, IBM UrbanCode Deploy, DB2, IBM MQ, DBCTL, and more. You practice your new skills on a z/OS system that is configured specifically for this lab-intensive course.
-
This ZL00G: zVM and zLinux Bootcamp course introduces the system programmer to the tasks required to support a z/VM operating system. It provides an overview of the processes required to install z/VM and perform the required tailoring steps to support guest operating system virtual machines and CMS users. The students will leave the course with the knowledge to perform the steps to add guest systems and other virtual machines to the z/VM system, to apply service to the z/VM system, and to define a minimal TCP/IP configuration. Additionally this course is designed to teach the implementation of SUSE Linux on System z.
-
This course teaches you the developer skills that are required to configure and implement authentication and authorization support within your IBM DataPower Gateway V7.5 services.
A common requirement for DataPower services is to authenticate the sender of a message, and authorize that sender to request the messages behavior. The AAA action within DataPower provides the basics of the authenticate, authorize, and audit support.
OAuth is an authorization framework that defines a way for a client application to access server resources on behalf of another party. It provides a way for the user to authorize a third party to their server resources without sharing their credentials. DataPower supports OAuth specifications and protocols and can provide an OAuth web token service.
OpenID Connect (OIDC) is an authentication layer that runs on top of an OAuth 2.0 authorization framework. DataPower can operate as an OIDC client.
-
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
- Describe how QRadar SIEM collects data to detect suspicious activities
- Describe the QRadar SIEM component architecture and data flows
- Navigate the user interface
- Investigate suspected attacks and policy breaches
- Search, filter, group, and analyze security data
- Investigate the vulnerabilities and services of assets
- Use network hierarchies
- Locate custom rules and inspect actions and responses of rules
- Analyze offenses created by QRadar SIEM
- Use index management
- Navigate and customize the QRadar SIEM dashboard
- Use QRadar SIEM to create customized reports
- Use charts and filters
- Use AQL for advanced searches
- Analyze a real world scenario
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
- Using the QRadar SIEM user interface
- Investigating an Offense triggered by events
- Investigating the events of an offense
- Investigating an offense that is triggered by flows
- Using rules
- Using the Network Hierarchy
- Index and Aggregated Data Management
- Using the QRadar SIEM dashboard
- Creating QRadar SIEM reports
- Using AQL for advanced searches
- Analyze a real-world large-scale attack
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
-
This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course.
-
This LX071G: Power Systems Running Linux: Server Administration course introduces basic administrative tasks associated with Linux Servers hosted on Power Systems servers. This includes installation, command line operations, system administration, device management, IBM tools, and system recovery.
-
This course enables you to perform everyday tasks using the AIX operating system. Learn to perform everyday tasks using the AIX operating system.
This course provides lectures and hands on labs in an instructor lead course environment, either in a face-to-face classroom or in a live virtual classroom environment (ILO – Instructor Led Online). The lab images are using the AIX 7.2 operating system.
-
Your company wants to automate records declaration for your IBM Enterprise Records system. In this course, you learn to configure automatic record declaration using two different methods: event subscriptions and workflow.
You work with a fully functioning IBM Enterprise Records system to practice the skills required for automating record declaration.
-
In this course, you will customize IBM Case Manager Client without using much code. In an IBM Case Manager system, you will create pages with custom layout and implement new actions by configuring buttons and menu items. You will use the Calendar widget to track case events and a Script Adapter widget to transform the data. You will learn how to wire two widgets together to establish communication, customize views for case properties including business objects, specify viewers for documents, and implement External Data Services to create dependent choice lists.
-
The WB402G: Developing Rule Solutions in IBM Operational Decision Manager course begins with an overview of Operational Decision Manager, which is composed of two main environments: Decision Server for technical users and Decision Center for business users. The course outlines the collaboration between development and business teams during project development.
Through instructor-led presentations and hands-on lab exercises, you learn about the core features of Decision Server, which is the primary working environment for developers. You design decision services and work with the object models that are required to author and execute rule artifacts. You gain experience with deployment and execution, and work extensively with Rule Execution Server. In addition, you become familiar with rule authoring so that you can support business users to set up and customize the rule authoring and validation environments. You also learn how to use Operational Decision Manager features to support decision governance.
The lab environment for this course uses Windows Server 2012 R2 Standard Edition.
-
Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.
Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.
The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.
This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.
Content in this course is:
- Aligned with the CISM job practice
- Adapted from the CISM Review Manual 16th Edition
- Reviewed by subject matter experts that hold the CISM certification
The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
Validate your expertise and get the leverage you need to move up in your career.
In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security.
Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
The only globally accepted IT risk management certification for professionals with three or more years of experience.
This credential demonstrates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. CRISC can enhance your IT team’s credibility with stakeholders and clients.
In this course, you’ll cover all four domains of the Certified in Risk and Information Systems Control (CRISC) exam and gain the knowledge and concepts required to obtain CRISC certification. Since its inception in 2010, the CRISC certification is for IT and business professionals who identify and manage risks through the development, implementation, and maintenance of appropriate information systems (IS) controls.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. By managing, advising and assessing the enterprise’s IT infrastructure and processes, individuals play a role in IT governance and provide significant support to the board of directors and executive management.
The Certified in the Governance of Enterprise IT® (CGEIT®) program supports increasing business demands and recognizes the wide range of professionals whose knowledge and application of IT governance principles are key to managing the forces of transition.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
→ Top ISACA Cybersecurity Certifications 2024 | Career Advancement
→ Incorporating ISACA Certifications into Corporate Training Program
→ ISACA’s CISM vs CRISC: Which Certification Is Right for You?
→ Your Ultimate Guide to the ISACA CISM Certification
→ Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance. In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.
COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.
COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.
-
This ITIL4-HVIT: ITIL 4 Specialist High Velocity IT certification module provides the candidate with an understanding of the ways in which digital organizations and digital operating models function in high velocity environments, focusing on rapid delivery of products and services to obtain maximum business value. Take what was established as THE best practice guidance of IT Service Management – then make it better.
ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL 4 Specialist: High Velocity IT (HVIT) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding practitioners who work in organizations that are becoming more digitally enabled. It will help those who are familiar with traditional IT and service management concepts to discuss ‘digital’ confidently, develop practical competencies, and integrate new concepts, techniques, and technologies into their ways of working. It also covers Agile and Lean, and technical practices and technologies such as the Cloud, Automation, and Automatic Testing.
This interactive course is essential to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 High Velocity IT qualification is one of the pre-requisites for the designation of ITIL4 Managing Professional.
-
This ITIL4-DSV: ITIL 4 Specialist Drive Stakeholder Value certification module provides the candidate with an understanding of all types of engagement and interactions between a service provider and their customers, users, suppliers, and partners, including key customer/user experience and journey mapping concepts. Take what was established as THE best practice guidance of IT Service Management – then make it better.
ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Specialist: Drive Stakeholder Value (DSV) course helps ITSM practitioners assimilate further into the emerging practices of ITIL 4 – specifically in the areas of guiding stakeholders, whether they are customers or service providers, through the principles and practices of co-creating value through services.
This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business. Successfully obtaining the ITIL 4 Drive Stakeholder Value qualification is one of the prerequisites for the designation of ITIL 4 Managing Professional which assesses the candidates practical and technical knowledge about how to run successful, modern, IT-enabled services, teams, and workflows.
-
Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The ITIL4 Strategist: Direct, Plan and Improve (DPI) course helps ITSM practitioners acquire further insight into ITIL 4 – specifically in the areas that contribute to creating and sustaining an IT organization steeped in the growth mindset.
The ITIL4-DPI: ITIL 4 Strategist Direct Plan and Improve certification course covers both practical and strategic elements related to improvement. Lean and Agile methodologies and techniques, a feature of ITIL 4, is embedded into directing, planning and improving services in support of business objectives. This interactive course is indispensable to the development of the modern day technologist and ITSM practitioner and leader in modern IT organizations seeking to innovate and improve IT services delivered to the business.
Level up your skills and stand out with a globally recognized ITIL 4 certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
Digital and information technologies have changed the world. Every aspect of life has been impacted in some way by technology that did not exist just 50 years ago. Digital and information technologies have disrupted the business world, but they have also provided the keys to success. Each wave of innovation brings opportunities and capabilities to those organizations that are willing to change how they think and work.
The disruptive nature of innovations like artificial intelligence, machine learning, virtual working, and internet of things is compounded by the frequency of the innovations. Organizations must adapt quickly and repeatedly; continually adjusting their strategies.
The IITL 4 Leader: Digital and IT Strategy course adds a new perspective to the ITIL 4 guidance and elevates the discussion to an organizational strategy level.
The course enables IT and digital leaders to influence and drive strategic business decisions through creating an appropriate digital strategy aligned to the wider business goals, understanding how business and IT leaders respond to digital disruption and exploiting the ITIL 4 framework to support organizations on their challenging digital transformation journey.
The course will cover how ITIL 4 can be integrated with emerging practices and new technologies to meet new internal and external challenges in the age of volatility, uncertainty, complexity and ambiguity (VUCA).
In this course, there is a mandatory case study assessment for student to pass prior to taking up the actual exam. This assessment is an open-book assessment with the passing score of 75% (30 correct out of 40).
-
Many city landmarks offer panoramic views from their observation decks. From a high viewpoint, the distances between some buildings might be closer and others further apart, than at first glance. Perspective is key and necessary component for the successful delivery of mature technology-enabled services.
In service management, two vital elements for success are perspective and flexibility:
- Perspective: understanding the overall picture of what a service does and how it is delivered. This involves a wide variety of skills, processes, knowledge, tools, and technologies to deliver business and customer value.
- Flexibility: involves using the portfolio of tools and artefacts appropriately within complex environments. Service management is not a one-size-fits-all approach. The expectations around the customer experience and business value cannot be met with a single and isolated view.
Take what was established as THE best practice guidance of IT Service Management – then make it better. ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution.
The ITIL 4 Specialist: Create, Deliver and Support (CDS) course helps ITSM practitioners assimilate further into the emerging practices of ITIL4 – specifically in the areas of the Service Value Stream and the use of the Value Stream with a specific focus on the creation, delivery and support of new services, and the provisioning of user support.
Relevant supporting ITIL Practices to these value streams are examined. Team collaboration, integration and organizational cultural aspects critical to the success of the adoption of the value streams are discussed. The course also covers the management and prioritization of work through several techniques and scrutinizes the contribution of continual improvement.
This interactive course is essential to the development of the modern-day technologist and ITSM practitioner and leader in modern IT organizations seeking innovation and delivering full value to the business.
-
Extensive research has consistently shown that ITIL is fundamental to businesses, enables digital transformation and helps organizations realize value. Many organizations invest heavily in adopting and adapting ITIL into their business practices and upskilling their workforce with ITIL qualifications.
ITIL 4 will help businesses navigate the new technological era, commonly known as the Fourth Industrial Revolution. The speed of current breakthroughs is disrupting almost every industry on a global scale. The Fourth Industrial Revolution is marked by emerging technology in fields including robotics, artificial intelligence, nanotechnology, quantum computing, biotechnology, the Internet of Things (IoT), 3D printing, autonomous vehicles and much more.
ITIL 4 Foundation certification provides a practical and flexible basis to support organizations on their journey into the new world of digital transformation by helping them align their human, digital and physical resources, adopt emerging technologies into their IT operations to compete within the complex modern landscape.
Begin your ITIL journey today with ITIL 4 Foundation before progressing to the ITIL Managing Professional (MP) or the Strategic Leader (SL) certification streams that provide advanced practical and technical knowledge, making them the absolute go-to designations for IT professionals and more.
-
Level up with Microsoft Certified: Azure Security Engineer Associate
Reduce costs and complexity with a highly secure cloud foundation managed by Microsoft. Use multilayered, built-in security controls and unique threat intelligence from Azure to help identify and protect against rapidly evolving threats.
This Azure Security Engineer course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities on Microsoft Azure. This course includes security for identity and access, platform protection, data and applications, and security operations.
Get Azure AI certified with Microsoft Malaysia’s Learning Partner of the Year 2024 today.
-
-26%
Level up with Microsoft Certified: Azure Data Scientist Associate.
Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This DP-100T01: Designing and Implementing a Data Science Solution on Azure course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure.
Level up your skills and stand out with a globally recognized certification with Yayasan Peneraju Financing Scheme – eligible for Bumiputera Malaysians.
-
Gain subject matter expertise to work with people, processes, and technologies to continuously deliver business value as an Azure DevOps Engineer.
Validate mastery of skills required to design and implement strategies for collaboration, code, infrastructure, source control, security, compliance, continuous integration, testing, delivery, monitoring, and feedback with the Microsoft Certified: DevOps Engineer Expert certification.
This Azure DevOps Engineer Expert course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms during this 4-days Azure DevOps training.
Are you currently retrenched? If yes, check out our PERKESO EIS: Get Back into the Workforce through Upskilling program.